Protocol eXchange Meeting - February 2004

Protocol eXchange Seminar

Naval Postgraduate School, Monterey, CA

February 9-11, 2004

Organized by Sylvan Pinsky, George Dinolt and Ed Zieglar

 

MONDAY February 9, 2004

09:00 - 09:50 A general overview of cryptographic protocol analysis [pdf]

Cathy Meadows (NRL)

 
10:00 - 10:15 Welcome remarks

 
10:15 - 11:15 Probablistic Polynomial-Time Process Calculus for Security Protocol Analysis [pdf]

Andre Scedrov (UPenn)
11:15 - 12:15 Multiset Rewriting [pdf]

John Mitchell (Stanford)

 
12:15 - 13:30 Lunch

 
13:30 - 14:30 Protocol Analysis Tool Development Using Java [pdf]

Stephen Mancini (Air Force Institute of Technology)
14:30 - 15:30 Approximations to Diffie-Hellman using rewrite rules [pdf]

Chris Lynch (Clarkson)

 
15:30 - 16:00 Break

 
16:00 - 17:00 Fine-Grained MSR Specificaitons for Quantitative Security Analysis [pdf]

Iliano Cervesato (ITT)

 
17:30 - ... Social dinner

 

TUESDAY February 10, 2004

09:00 - 09:50 Authentication Tests using Strand Spaces [pdf]

Al Maneki (NSA)

 
10:00 - 11:00 The Trust Supports and the Shapes of Bundles [pdf]

Joshua Guttman (MITRE)
11:00 - 12:00 Cash Transfer Primitives, Trust Management and Money [pdf]

Javier Thayer (MITRE)

 
12:00 - 13:00 Lunch

 
13:00 - 14:00 Security Policies embodied in Security Protocols

George Dinolt (NPS), Sylvan Pinsky (NSA)
14:00 - 15:00 Protocol Analysis Using SAL [pdf]

John Rushby (SRI)

 
15:00 - 15:30 Break

 
15:30 - 17:00 Research Overview [pdf]

Open APIs for Embedded Security [pdf]

Carl Gunter (UPenn)

 

WEDNESDAY February 11, 2004

09:00 - 09:50 Understanding Strand Space Concepts and their application to protocol analysis [pdf]

Joshua Guttman (MITRE)

 
10:00 - 11:00 Security Issues in Wireless Comunication

Ed Zieglar (NSA)
11:00 - 12:00 Concurrent Broadcasting Schemes for Wireless Networks

Mark-Oliver Stehr (UIUC)

 
12:00 - 13:00 Lunch

 
13:00 - 14:00 The Maude Execution Environment [pdf]

Carolyn Talcott (SRI)
14:00 - 15:00 Applying a Compositional Authentication Logic to a Protocol Standard [pdf]

Cathy Meadows (NRL)

 
15:00 - 15:30 Break

 
15:30 - 16:30 Trusting the Network

Dominic Duggan (Stevens)

 

Presentations collected by Iliano Cervesato